PrepAway - Latest Free Exam Questions & Answers

Which two statements apply to dynamic access lists?

Which two statements apply to dynamic access lists? (Choose two)

PrepAway - Latest Free Exam Questions & Answers

A.
they offer simpler management in large internetworks.

B.
you can control logging messages.

C.
they allow packets to be filtered based on upper-layer session information.

D.
you can set a time-based security policy.

E.
they provide a level of security against spoofing.

F.
they are used to authenticate individual users.

6 Comments on “Which two statements apply to dynamic access lists?

  1. BeCooked says:

    This question’s answer key is wrong. According to Cisco web site:
    “Benefits of Lock-and-Key

    Lock-and-key provides the same benefits as standard and static extended access lists (these benefits are discussed in the chapter “Access Control Lists: Overview and Guidelines”). However, lock-and-key also has the following security benefits over standard and static extended access lists:

    •Lock-and-key uses a challenge mechanism to authenticate individual users.

    •Lock-and-key provides simpler management in large internetworks.

    •In many cases, lock-and-key reduces the amount of router processing required for access lists.

    •Lock-and-key reduces the opportunity for network break-ins by network hackers.

    With lock-and-key, you can specify which users are permitted access to which source and destination hosts. These users must pass a user authentication process before they are permitted access to their designated hosts. Lock-and-key creates dynamic user access through a firewall, without compromising other configured security restrictions. ”

    http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scflock.html#wp1000936

    Someone needs to correct this answer, so no one will pick wrong answers.




    0



    0
  2. James Bond says:

    Answer: A F

    Explanation

    Dynamic ACLs have the following security benefits over standard and static extended ACLs:
    + Use of a challenge mechanism to authenticate individual users
    + Simplified management in large internetworks
    + In many cases, reduction of the amount of router processing that is required for ACLs
    + Reduction of the opportunity for network break-ins by network hackers
    + Creation of dynamic user access through a firewall, without compromising other configured security restrictions




    0



    0
  3. Mickie says:

    Hello, i read your blog from time to time and i own a similar one
    and i was just curious if you get a lot of spam responses?
    If so how do you prevent it, any plugin or anything you can recommend?
    I get so much lately it’s driving me insane so any support is very
    much appreciated.




    0



    0

Leave a Reply